Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Cohere’s new AI agent promises to protect the platform, North, enterprise data

    August 6, 2025

    5 command line backup tool each Linux user should use for desktop and server

    August 6, 2025

    8 Reasons I replaced my kindle with an ipad mini to read e -books

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Google fixes high severity with public exploitation
    Security

    Google fixes high severity with public exploitation

    PineapplesUpdateBy PineapplesUpdateMay 15, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Google fixes high severity with public exploitation
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Google fixes high severity with public exploitation

    Google has issued an emergency security updates to patch a high-seriousness vulnerability in the Chrome web browser that can acquire full account after successful exploitation.

    Although it is not clear that this safety defects have been used in attacks, the company warned that it is a public exploitation, which usually indicates active exploitation.

    “Google is aware of those reports that an exploitation for CVE-2025-4664 is present in the wild,” Google said Wednesday’s security advisor.

    The vulnerability was discovered by solidlab security researcher Vsevolod Kokorin and is It has been told As an insufficient policy enforcement in Google Chrome’s loader component, which allows distance attackers to leak cross-oriented data through the HTML pages prepared maliciously prepared.

    “You probably know that unlike other browsers, Chrome solves the link header on subresores requests. But what is the problem? The issue is that the link header can set a refer-policy. Cocorin explained,

    “Querry parameters can contain sensitive data – for example, in Oauth flow, this can lead to an account acquisition. Developers rarely consider the possibility of stealing query parameters through an image from 3 -party resources.”

    Leaked Ohoth Access Token
    Leaked Oouth Access Token (Vsevolod Kokorin)

    Google fixed the blame for users in the stable desktop channel, rolled out users worldwide with patched versions (136.0.7103.113 for Windows/Linux and 136.0.7103.114 for McOS and McOS 136.0.7103.114).

    Although the company says that security updates would roll out in the coming days and weeks, they were immediately available when Bleepingcomputer checked for updates.

    Users who do not want to update chrome manually can allow the browser to check automatically for new updates and install them after the next launch.

    In March, Google also set up a high-seriousness Chrome Zero-Day Bag (CVE-2025-2783), which was misused to deploy malware in detective attacks targeting Russian government organizations, media outlets and educational institutions.

    Researchers at Kasperki actively discovered the exploited zero-day, stating that the attackers use CVE-2015-2783 to bypass Chrome sandbox security and infect the target with malware.

    Last year, Google revealed or exploited 10 zero-days during the PWN2OWN hacking competition or exploited attacks.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    exploitation fixes Google high Public severity
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWharfedale’s new EVO 5 speaker looks perfect for music or home theater, I can be behind at a price
    Next Article Best Fast Chargers for 2025
    PineapplesUpdate
    • Website

    Related Posts

    Security

    8 Reasons I replaced my kindle with an ipad mini to read e -books

    August 6, 2025
    Security

    Last Call: Tonight disrupt 2025 ticket savings end

    August 6, 2025
    Security

    Let the Revolt Falls Hackers bypass Windows Login on Dell Laptop

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Cohere’s new AI agent promises to protect the platform, North, enterprise data

    August 6, 2025

    5 command line backup tool each Linux user should use for desktop and server

    August 6, 2025

    8 Reasons I replaced my kindle with an ipad mini to read e -books

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.